The Benefits and Security Risks of Web-Based Applications for Business: Trend Report
()
About this ebook
This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report.
It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use.
The Benefits and Security Risks of Web-Based Applications for Business is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
- Provides security executives and practitioners with an overview of how companies have begun to adopt web-based applications and tools for employee use
- Describes the benefits of web-based applications and warns of the potential risks associated with their use in the workplace
- Includes practical recommendations to mitigate the risks of web-based applications
Kathleen Kotwica
Kathleen Kotwica has a PhD in experimental psychology from DePaul University and has had a career as a researcher and knowledge strategist. Her experience includes positions as information architecture consultant at a New England consulting firm, director of online research at CXO Media (IDG), and research associate at Children's Hospital in Boston. She has authored and edited security industry trade and business articles and has spoken at security-related conferences including CSO Perspectives, SecureWorld Expo, ASIS, and CSCMP. In her current role as EVP and chief knowledge strategist at the Security Executive Council she leads the development and production of Council tools, solutions, and publications. She additionally conducts industry research and analysis to improve security and risk management practices.
Read more from Kathleen Kotwica
Business Continuity: Playbook Rating: 0 out of 5 stars0 ratingsNine Practices of the Successful Security Leader: Research Report Rating: 0 out of 5 stars0 ratingsCorporate Security Organizational Structure, Cost of Services and Staffing Benchmark: Research Report Rating: 0 out of 5 stars0 ratingsInternational Security Programs Benchmark Report: Research Report Rating: 3 out of 5 stars3/5Crisis Management at the Speed of the Internet: Trend Report Rating: 0 out of 5 stars0 ratingsBring Your Own Device (BYOD) to Work: Trend Report Rating: 0 out of 5 stars0 ratings
Related to The Benefits and Security Risks of Web-Based Applications for Business
Related ebooks
Threat 2.0: Security and Compliance for Web 2.0 Sites Rating: 0 out of 5 stars0 ratingsHow to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide Rating: 0 out of 5 stars0 ratingsService and Advanced Technology: Practical Essays Rating: 0 out of 5 stars0 ratingsWeb Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsBring Your Own Device (BYOD) to Work: Trend Report Rating: 0 out of 5 stars0 ratingsFortify Your Data: A Guide to the Emerging Technologies Rating: 0 out of 5 stars0 ratingsA Best Practices Guide for Comprehensive Employee Awareness Programs Rating: 0 out of 5 stars0 ratingsCollaboration with Cloud Computing: Security, Social Media, and Unified Communications Rating: 0 out of 5 stars0 ratingsBusiness Continuity State of the Industry Report Rating: 0 out of 5 stars0 ratingsLessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure Rating: 0 out of 5 stars0 ratingsSecuring Social Media in the Enterprise Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsApplication Performance Management (APM) in the Digital Enterprise: Managing Applications for Cloud, Mobile, IoT and eBusiness Rating: 0 out of 5 stars0 ratingsThe Case for ISO27001:2013 Rating: 1 out of 5 stars1/5Building an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsFree Antivirus and its Market Implimentation: a Case Study of Qihoo 360 And Baidu Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 CCSP CBK Reference Rating: 0 out of 5 stars0 ratingsCitizen Development: The Handbook for Creators and Change Makers Rating: 4 out of 5 stars4/5Cloud Security and Governance: Who's on your cloud? Rating: 1 out of 5 stars1/5Don’t Ever Think About Passwords Again Rating: 0 out of 5 stars0 ratingsBenefits Management: How to Increase the Business Value of Your IT Projects Rating: 4 out of 5 stars4/5Entity Information Life Cycle for Big Data: Master Data Management and Information Integration Rating: 0 out of 5 stars0 ratingsData-Driven Business Strategies: Understanding and Harnessing the Power of Big Data Rating: 0 out of 5 stars0 ratingsBig Data: Opportunities and challenges Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsBusiness Practical Security Rating: 0 out of 5 stars0 ratingsBring Your Own Device (BYOD): The mobile computing challenge Rating: 0 out of 5 stars0 ratings
Enterprise Applications For You
Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Notion for Beginners: Notion for Work, Play, and Productivity Rating: 4 out of 5 stars4/5Bitcoin For Dummies Rating: 4 out of 5 stars4/5Access 2019 For Dummies Rating: 0 out of 5 stars0 ratingsLearn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsExcel Formulas That Automate Tasks You No Longer Have Time For Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsExcel 2019 For Dummies Rating: 3 out of 5 stars3/5QuickBooks 2023 All-in-One For Dummies Rating: 0 out of 5 stars0 ratings101 Ready-to-Use Excel Formulas Rating: 4 out of 5 stars4/550 Useful Excel Functions: Excel Essentials, #3 Rating: 5 out of 5 stars5/5Enterprise AI For Dummies Rating: 3 out of 5 stars3/5Learning Python Rating: 5 out of 5 stars5/5Excel Formulas and Functions 2020: Excel Academy, #1 Rating: 4 out of 5 stars4/5Scrivener For Dummies Rating: 4 out of 5 stars4/5Mastering QuickBooks 2020: The ultimate guide to bookkeeping and QuickBooks Online Rating: 0 out of 5 stars0 ratingsChange Management for Beginners: Understanding Change Processes and Actively Shaping Them Rating: 5 out of 5 stars5/5The New Email Revolution: Save Time, Make Money, and Write Emails People Actually Want to Read! Rating: 5 out of 5 stars5/5Microsoft 365 For Dummies Rating: 0 out of 5 stars0 ratingsExcel : The Complete Ultimate Comprehensive Step-By-Step Guide To Learn Excel Programming Rating: 0 out of 5 stars0 ratingsSystems Thinking: Managing Chaos and Complexity: A Platform for Designing Business Architecture Rating: 4 out of 5 stars4/5Excel 2016 For Dummies Rating: 4 out of 5 stars4/5The Ridiculously Simple Guide To Numbers For Mac Rating: 0 out of 5 stars0 ratings102 Useful Excel 365 Functions: Excel 365 Essentials, #3 Rating: 0 out of 5 stars0 ratings
Reviews for The Benefits and Security Risks of Web-Based Applications for Business
0 ratings0 reviews
Book preview
The Benefits and Security Risks of Web-Based Applications for Business - Kathleen Kotwica
The Benefits and Security Risks of Web-Based Applications for Business
Trend Report
RISK MANAGEMENT PORTFOLIO
Kathleen Kotwica
Table of Contents
Cover image
Title page
Copyright
Executive Summary
What is a Trend Report?
Introduction
What is Web 2.0?
Millennial Workers
Research Findings
The Benefits of Web-Based Applications and Current Adoption Rates
The Risks of Web-Based Applications in the Workplace
Summary
Additional Resources
References
About the Author
About Elsevier’s Security Executive Council Risk Management Portfolio
Copyright
Elsevier
The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK
225 Wyman Street, Waltham, MA 02451, USA
First published 2013
Copyright © 2013 The Security Executive Council. Published by Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission